Multi-Tenant Architecture Comparison
|
|
|
- Samson Conley
- 10 years ago
- Views:
Transcription
1 Multi-Tenant Architecture Comparison Jaap Kabbedijk, Michiel Pors, Slinger Jansen, and Sjaak Brinkkemper Department of Information and Computing Sciences Utrecht University, Netherlands {J.Kabbedijk, M.Pors, Slinger.Jansen, Abstract. Software architects struggle to choose an adequate architectural style for multi-tenant software systems. Bad choices result in poor performance, low scalability, limited flexibility, and obstruct software evolution. We present a comparison of 12 Multi-Tenant Architecture (MTA) patterns that supports architects in choosing the most suitable architectural pattern, using 17 assessment criteria. Both patterns and criteria were evaluated by domain experts. Five architecture assessment rules of thumb are presented in the paper, aimed at making fast and efficient design decisions. The comparison provides architects with an effective method for selecting the applicable multi-tenant architecture pattern, saving them effort, time, and mitigating the effects of making wrong decisions. Keywords: multi-tenancy; architecture patterns; quality attributes; 1 Introduction As a consequence of the current shift of on-premises software to the cloud [4], software architects find themselves facing numerous new challenges related to the adequacy of architectures for cloud software. A commonly used technique in architecting for Software-as-a-Service (SaaS) is the use of the concept of multitenancy, which is defined for this research as a property of a system where multiple varying customers and their end-users share the system s services, applications, databases, or hardware resources, with the aim of lowering costs [11]. Multi-tenancy can bring about many benefits. By serving the software service from a centrally hosted location, clients are relieved from the responsibility of purchasing and maintaining expensive in-house servers. The total cost of ownership decreases, giving the SaaS provider access to new potential customers that previously could not afford the expenses [2]. In addition, the utilization rate of hardware in a multi-tenant environment is higher than in a single-tenant environment [12]. Furthermore, when multiple customers share application and data instances, the total number of running instances will be lower than in a single-tenant environment, catering the same number of customers. A low number of instances is beneficial for maintenance [9] and is beneficial for application development [1]. However, multiple barriers withhold service providers from massively switching to multi-tenant environments. The challenges for multi-tenancy adoption
2 include performance [10], scalability, security [7], and the re-engineering of current software applications [13]. Selecting the appropriate multi-tenant architecture is a complex problem due to the existence of numerous alternative architectural patterns. Benefits and barriers of multi-tenancy are identified and described in literature, but the aspect of choosing an appropriate multi-tenant architecture based on software vendors preferences has received little attention in literature. Finding the most suitable multi-tenant architecture is crucial; it expresses a fundamental structural organization schema for a provider s software system. However, choosing the appropriate architecture is a wicked problem [5]. Accounting for all the challenges and benefits complicates the decision process considerably [8]. This paper presents a comparison of different Multi-Tenant Architecture (MTA) patterns, based on the the mixed method research approach used within this study (Section 2). The twelve different MTA patterns are shown in section 3, together the MTA comparison matrix in section 4. We conclude with a discussion on the comparison, together with threats to validity present and future work in section 5, focussing on the importance of evaluating more effective methods in architectural decision making. 2 Research Approach The main research question of this research is formulated as follows: RQ. How can a SaaS provider be supported in the decision process of choosing an applicable multi-tenant architecture? Three sub questions are answered in order to develop a decision model that solves the main research question. The decision model consists of three fundamental elements, which need to be identified. The first element is a set of multi-tenant architectures to choose from. Hence, the first sub question is defined as follows: SQ1. What distinctive layers in multi-tenant architectures can be defined? Using a Structured Literature Research (SLR), the distinctive layers in multitenant architectures are identified in SQ1. For more details on the search query, criteria, strategy and construction of trail searches, please see [11]. Instead of searching directly for multi-tenant architectures and documenting them, a different approach is taken. First, different layers on which multi-tenancy can be applied are identified. Then, generic multi-tenant architectures are identified, based on these layers. The list of identified architectures is evaluated by domain experts to ensure the list is complete and concise. The expert evaluation is not only essential for checking the correctness of the list, but also to make sure the identified architectures reflect relevant and implementable architectures. SQ2. What are the relevant decision criteria for choosing an appropriate multi-tenant architecture? SQ2 aims at identifying the different decision criteria, or architecturally significant requirements, related to multi-tenant architectures.
3 The decision criteria are quantifiable attributes distinguishing between the different multi-tenant architectures. Similar to the identification of the MTAs, a structured literature research is carried out to identify the list of criteria. The identification process results in a large set of criteria, which is analyzed in order to merge similar and delete unimportant attributes. Consequently, the completeness and conciseness of the list is evaluated in an expert evaluation. Finally, the multi-tenant architectures must be evaluated using the decision criteria, resulting in performance scores. The final sub question is stated as: SQ3. How do the different multi-tenant architectures perform on the decision criteria? In SQ3, an evaluation is performed in which all MTAs are assessed by domain experts on the identified decision characteristics. The evaluation serves as a basis for MTA decision making. 3 Multi-tenant Architectures The levels at which multi-tenancy can be applied, resulting from the literature study, are shown in Table 1. All levels are listed together with the frequency of occurrence (N) in literature. The different levels are depicted as layers in a stack with decreasing granularity from top to bottom in Figure 1. The granularity aspect translates to a sharing versus isolation continuum, where the lowest layer has the lowest level of sharing with the highest level of isolation. For the highest layer it is vice versa. When multi-tenancy is applied at a specific level, the levels below that level are shared among tenants as well, but isolation occurs at the levels above, i.e. for each tenant a dedicated instance is running. This applies to the application and data layer independently. Multi-tenancy level N Application Instance 16 Database Server 16 Database 15 Operating System 15 Hardware 14 Schema 14 Middleware 12 Virtual Machine 9 Application Server 4 A { D{ Application Instance Application Server Middleware Database Schema Database Database Server Operating System Virtual Machine Hardware Table 1. Multi-Tenancy levels identified in literature Fig. 1. Multi-tenancy computing stack. A and D relatively indicate the Application and Data related layer sets The final two levels of the stack in the data layer are the database and schema level. These two levels were first described by Chong et al. [3]. When tenants are
4 consolidated in a single database, each tenant operates its own set of tables. In schema-level multi-tenancy, isolation occurs at table row level. The application related layer set (A) and the data related layer set (D) are stacks commonly used in enterprise architecture in order to separate concerns [6]. Within this research the application layers and data layers are identified as separate layer sets, each containing different sub layers, as can be seen in Figure 1. Consequently, three tenancy levels, indicated by a two letter abbreviation, are identified in the Application related layer set (A). The different levels result from identifying ascending levels of sharing among all layers on the set: 1. AD - A Dedicated Application server is running for each tenant, and therefore each tenant receives a dedicated application instance. 2. AS - A single Application Server is running for multiple tenants and each tenant receives a dedicated application instance. 3. AI - A single application server is running for multiple tenants and a single Application Instance is running for multiple tenants. The first level corresponds to multi-tenancy enabled at the hardware or virtual machine level. The second level is equal to application server multi-tenancy. The third level is the same as multi-tenancy enabled at the application instance level. In the Data related layer set (D) a service provider can select one the following four tenancy levels: 1. DD - A Dedicated Database server is running for each tenant, and therefore each tenant receives a dedicated database. 2. DS - A single Database Server is running for multiple tenants and each tenant receives a dedicated database. 3. DB - A single DataBase server is running for multiple tenants, data from multiple tenants is stored in a single database, but each tenant receives a dedicated set of tables. 4. DC - A single database server is running for multiple tenants, data from multiple tenants is stored in a single database and a single set of tables, sharing the same Database schema. The first level is equal to multi-tenancy applied at the hardware or virtual machine level. The second one corresponds to database server multi-tenancy. The third alternative is the same as multi-tenancy applied to the database and the final one is equal to database schema multi-tenancy. From these options in both the application and data layer, the set of multitenant architectures (MTAs) are constructed. Based on the tenancy levels within the layers, the number of possible architectures is twelve. Because all MTAs prescribe a specific tenancy level in set A and D, each architecture is defined as a tuple: MT A = {AD, AS, AI}, {DD, DS, DB, DC} (1) Each of the twelve MTAs can be seen as an architectural pattern in which tenants (Tenant A, B and C in the example MTAs) communicate with a software
5 application consisting of an application layer and a data layer as shown in Figure 2. For a complete overview of all MTAs please see [11]. Fig. 2. MTA AD, DS - Dedicated Application Server & Shared Database Server In Figure 2 the application layer is represented as a set of application servers running one or multiple application instances. The data layer is displayed as a set of database servers, running one or more databases, in which one or multiple database schema s exist. If one of these entities is shared among the tenants, its color is gray. If its dedicated to only one tenant, its colored white. For the sake of simplicity only three tenants are displayed in the architectures. A service provider can offer his software application to more than three tenants, the patterns merely presents possible arrangements of shared resources. 4 MTA Comparison Matrix The MTA pattern comparison offers decision makers a method to make an informed and balanced decision on the MTAs to consider implementing for their software product. The MTA Comparison Matrix in Table 2 offers a high level of detail, while also giving a quick overview of the strengths and weaknesses of all patterns. Using the matrix, architects can get an overview of the consequences of all different MTA patterns and assess the weight of the consequences for their specific situation. Based on the consequences and the weights, architects can select a subset of patterns to evaluate more thoroughly. To help in selecting a subset for future analysis, this section presents some Rules of Thumb (RT) derived from the comparison matrix and are helpful in giving decision makers a quick overview of the most important consequences of an MTA assessment. RT1. Focus on the database dimension The effect of different MTAs on decision criteria is largest on the database dimension. The MTA Comparison Matrix shows the effect of database related decisions is higher than application related decisions. Choosing between a set of MTAs, focus on database related decisions first, and application related decisions after. RT2. Sharing database tables enables serving of many tenants but harms robustness Selecting an MTA in which the database schema is
6 Decision Criterion AD, DD AS, DD AI, DD AD, DS AS, DS Time Behavior Resource Utilization Throughput Number of Tenants Number of End-Users Availability Recoverability Confidentiality Integrity Authenticity Maintainability Portability Deployment Time Variability Diverse SLA Software Complexity Monitoring Table 2. Multi-Tenant Architecture Comparison Matrix (In color) indicates a highly negative effect, by applying the pattern, on the decision criterion. 5.0 indicates a highly positive effect. AI, DS AD, DB AS, DB AI, DB AD, DC AS, DC AI, DC Dist. Factor (σ 2 ) shared (i.e. A?, DC 1 ) is beneficial if the software product serves many tenants and end-users. The product is easy to maintain and monitor, and deployment time is minimal. The recoverability of the system, on the other hand, is greatly compromised. It is difficult to implement variability and tenant data may be at risk of unintentional sharing. Based on this trade-off, SaaS providers should select A?, DC when designing a large scale software product with limited variability requirements. RT3. Sharing application instances helps maintainability and performance but harms variability Choosing an MTA, decision makers can decide to share the application instance among tenants (i.e. AI, D? ). Doing so causes the maintainability and ease of monitoring to increase. Also the resource utilization is better and the deployment time low. The variability of the software product, however, is lower and more difficult to implement. Because of this, SaaS should choose AI, D? when maintainability and performance efficiency are important. 1? is used as a single character wild card.
7 RT4. Ease of implementing variability differs greatly per MTA Out of all decision criteria, variability has the highest distinction factor. This means the variability of a software product is for a significant part determined by the implemented MTA. Choosing an MTA with a low tenancy level (i.e. AD, DD, variability is relatively easy to achieve. Selecting an MTA with a high tenancy level however (i.e. AI, DC ), causes large problems implementing variability over all tenant instances. RT5. Dedicated servers improve performance and variability, but hamper scalability When choosing an MTA with dedicated servers (i.e. AD, DD ) the time behavior, recoverability, variability and confidentiality are expected to be good, and software complexity low. The downside to this approach is the low scalability of the system; when the number of tenants increases, dedicated servers become hard to maintain and hardware costs will rise. Choose AD, DD for software products with a small user base that need to have high performance and a high level of flexibility. Typically large enterprise applications fall in this category. The rules of thumb listed in this section do not aim for completeness, but rather give software architects and decision makers a collection of rules to guide their architecture selection. 5 Discussion and Conclusion The identification of the 12 different multi-tenant architecture patterns and the comparison of the patterns, along with a list of assessment criteria and rules of thumb, support SaaS providers in providing a concise and versatile method for multi-tenant architecture assessment. In case specific assessment criteria or MTAs are irrelevant to a decision maker for some reason, those elements can be easily removed from the analysis, simplifying the selection of a suitable architecture. If a SaaS provider feels important decision criteria are missing from the assessment model, extra decision criteria can be added in the analysis. However, performance values of the MTAs on these criteria can not be provided in this research. We identify the following threats to validity to this study: 1. The small sample of 10 domain experts used may lead to biased results. A larger set would potentially increase the generalizability of the results. 2. All experts are from the same company. This threat is mitigated by the fact they are all employed at different independent projects. 3. The comparison matrix is not evaluated in practice in an extensive case study to test the applicability. By performing a case study, the appropriateness of the matrix can be validated. All are threats to external validity, as defined by Yin [14]. We suggest further research to focus on demonstrating the analytic hierarchy process in conjunction with the comparison matrix at several companies. Then, the ratings can be evaluated more thoroughly resulting in possible adjustments for these performance values. Furthermore, the ratings provided in this research are based on subjective judgements of ten experts. The accuracy of the ratings can be increased by surveying a larger number of experts, causing a decrease of the standard deviation.
8 6 Acknowledgments This research is funded by the NWO/ICT-Regie Product as a Service grant. Special thanks to Leen Blom and the experts willing to cooperate in our research. We would also like to thank Hans van Vliet for providing valuable feedback. References 1. Bezemer, C.P., Zaidman, A., Platzbeecker, B., Hurkmans, T., t Hart, A.: Enabling multi-tenancy: An industrial experience report. In: Proc. of the Int. Conference on Software Maintenance (ICSM). pp IEEE (2010) 2. Chong, F., Carraro, G.: Architecture strategies for catching the long tail. Tech. rep., MSDN Library, Microsoft Corporation (2006) 3. Chong, F., Carraro, G., Wolter, R.: Multi-tenant data architecture. Tech. rep., MSDN Library, Microsoft Corporation (2006) 4. D souza, A., Kabbedijk, J., Seo, D., Jansen, S., S., B.: Software-as-a-service: Implications for business and technology in product software companies. In: Proceedings of the Pacific Asia Conference on Information Systems (PACIS). pp (2012) 5. Esfahani, N., Razavi, K., Malek, S.: Dealing with uncertainty in early software architecture. In: Proc. of the Int. Symposium on the Foundations of Software Engineering. p. 21. ACM (2012) 6. Fowler, M.: Patterns of enterprise application architecture. Addison-Wesley Professional (2003) 7. Guo, C.J., Sun, W., Huang, Y., Wang, Z.H., Gao, B.: A framework for native multitenancy application development and management. In: Proc. of the Int. Conference on E-Commerce Technology (CEC). pp IEEE (2007) 8. Kazman, R., Asundi, J., Klein, M.: Quantifying the costs and benefits of architectural decisions. In: Proc. of the Int. Conference on Software Engineering (ICSE). pp IEEE Computer Society (2001) 9. Kwok, T., Nguyen, T., Lam, L.: A software as a service with multi-tenancy support for an electronic contract management application. In: Proc. of the Int. Conference on Services Computing (SCC). pp (2008) 10. Lin, H., Sun, K., Zhao, S., Han, Y.: Feedback-control-based performance regulation for multi-tenant applications. In: Proc. of the Int. Conference on Parallel and Distributed Systems (ICPADS). pp IEEE (2009) 11. Pors, M., Blom, L., Kabbedijk, J., Jansen, S.: Sharing is caring - a decision support model for multi-tenant architectures. Tech. Rep. UU-CS , Department of Information and Computing Sciences, Utrecht University (2013) 12. Sääksjärvi, M., Lassila, A., Nordström, H.: Evaluating the software as a service business model: From cpu time-sharing to online innovation sharing. In: Proce. of the Int. Conference e-society. pp Qawra, Malta (2005) 13. Tsai, C.H., Ruan, Y., Sahu, S., Shaikh, A., Shin, K.G.: Virtualization-based techniques for enabling multi-tenant management tools. In: Managing Virtualization of Networks and Services, pp Springer (2007) 14. Yin, R.K.: Case study research: Design and methods, vol. 5. Sage (2009)
Multi-Tenant Engineering Architecture in SaaS
Multi-Tenant Engineering Architecture in SaaS Sunil Kumar Khatri Himanshu Singhal Khushboo Bahri ABSTRACT Multi-Tenancy in SaaS (Software as a Service) architecture is the concept leveraging cloud computing
Software Patterns for Runtime Variability in Online Enterprise Software
Software Patterns for Runtime Variability in Online Enterprise Software Jaap Kabbedijk & Slinger Jansen BENEVOL 2013 Utrecht University December 16, 2013 Outline Introduction Dynamic Function Adaptation
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information
Architectural Concerns in Multi-Tenant SaaS Applications
Architectural Concerns in Multi-Tenant SaaS Applications Rouven Krebs 1, Christof Momm 1 and Samuel Kounev 2 1 SAP AG, Dietmar-Hopp-Allee 16, 69190 Walldorf, Germany 2 Karlsruhe Institute of Technology,
How To Make Money From Cloud Computing
CLOUD COMPUTING DATA ARCHITECTURE Harry Katzan, Jr. Savannah State University ABSTRACT Cloud computing is an application architecture for accessing and hosting computing service over the Internet. Access
A Standardized Maturity Model for Designing SaaS Service Guideline
A Standardized Maturity Model for Designing SaaS Guideline Seungseok Kang 1, Jaeseok Myung 1, Jongheum Yeon 1, Seong-wook Ha 2, Taehyung Cho 2, Ji-man Chung 2, Sang-goo Lee 1 Department of Computer Science
Conceptual Approach for Performance Isolation in Multi-Tenant Systems
Conceptual Approach for Performance Isolation in Multi-Tenant Systems Manuel Loesch 1 and Rouven Krebs 2 1 FZI Research Center for Information Technology, Karlsruhe, Germany 2 SAP AG, Global Research and
Elasticity in Multitenant Databases Through Virtual Tenants
Elasticity in Multitenant Databases Through Virtual Tenants 1 Monika Jain, 2 Iti Sharma Career Point University, Kota, Rajasthan, India 1 [email protected], 2 [email protected] Abstract -
An Approach Towards Customized Multi- Tenancy
I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy
Zero Downtime In Multi tenant Software as a Service Systems
Zero Downtime In Multi tenant Software as a Service Systems Toine Hurkmans Principal, Research Engineering Exact Software About Exact Software Founded 25 years ago Business Solutions for SMB space 100.000
Cloud application services (SaaS) Multi-Tenant Data Architecture Shailesh Paliwal Infosys Technologies Limited
Cloud application services (SaaS) Multi-Tenant Data Architecture Shailesh Paliwal Infosys Technologies Limited The paper starts with a generic discussion on the cloud application services and security
Versioning for Software as a Service in the context of Multi-Tenancy
Versioning for Software as a Service in the context of Multi-Tenancy Maximilian Schneider and Johan Uhle July 2013 University of Potsdam, Hasso-Plattner-Institute Prof.-Dr.-Helmert-Str. 2-3, 14482 Potsdam,
A Platform for Changing Legacy Application to Multi-tenant Model
, pp.407-418 http://dx.doi.org/10.14257/ijmue.2014.9.8.38 A Platform for Changing Legacy Application to Multi-tenant Model Yangpeng Zhu School of Economic and Management, Xi an Shiyou University, Xi an
Security Issues in Cloud Computing
Security Issues in Cloud Computing Dr. A. Askarunisa Professor and Head Vickram College of Engineering, Madurai, Tamilnadu, India N.Ganesh Sr.Lecturer Vickram College of Engineering, Madurai, Tamilnadu,
Commercial Software Licensing
Commercial Software Licensing CHAPTER 12: Prepared by DoD ESI January 2013 Chapter Overview Most software licenses today are either perpetual or subscription. Perpetual licenses involve software possession
Software as a Service (SaaS) for Management information system using multiple tenants
Software as a Service (SaaS) for Management information system using multiple tenants Rachana Desale, Purva Kolhatkar, Anju More, Piyush Katira, Vishal Kokane Prof.S.M.Jaybhaye (Department of Information
QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP
QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP Mingzhe Wang School of Automation Huazhong University of Science and Technology Wuhan 430074, P.R.China E-mail: [email protected] Yu Liu School
Enterprise Resource Planning System Deployment on Mobile Cloud Computing
Asia-pacific Journal of Multimedia Services Convergence with Art, Humanities and Sociology Vol.3, No.1 (2013), pp. 1-8 http://dx.doi.org/10.14257/ajmscahs.2013.06.02 Enterprise Resource Planning System
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled
Hexaware E-book on Q & A for Cloud BI Hexaware Business Intelligence & Analytics Actionable Intelligence Enabled HEXAWARE Q & A E-BOOK ON CLOUD BI Layers Applications Databases Security IaaS Self-managed
1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
Cloud, On-premises, and More: The Business Value of Software Deployment Choice
Cloud, On-premises, and More: A research report prepared by: Publication sponsored by: TABLE OF CONTENTS Introduction: Choices, Limits, and Adaptability Isn t Everything Cloud? The Importance of Architecture
Survey on Multi-Tenant Data Architecture for SaaS
www.ijcsi.org 198 Survey on Multi-Tenant Data Architecture for SaaS Li heng 1, Yang dan 2 and Zhang xiaohong 3 1 College of Computer Science, Chongqing University Chongqing, 401331, China 2 School of Software
Building a SaaS Application. ReddyRaja Annareddy CTO and Founder
Building a SaaS Application ReddyRaja Annareddy CTO and Founder Introduction As cloud becomes more and more prevalent, many ISV s and enterprise are looking forward to move their services and offerings
Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao [email protected] Mentor:
A Framework for Migrating Traditional Web Applications into Multi-Tenant SaaS
A Framework for Migrating Traditional Web Applications into Multi-Tenant SaaS Eyad Saleh, Nuhad Shaabani, and Christoph Meinel Hasso-Plattner-Institut University of Potsdam Potsdam, Germany {eyad.saleh,
Multi Tenancy Access Control Using Cloud Service in MVC
Multi Tenancy Access Control Using Cloud Service in MVC 1 Sonia Gupta, 2 Rubal Choudary Indo Global College of Engg, Abhipur, Mohali Abstract - Cloud Computing is the next generation Internet service and
Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical
Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
Convert your web application to a Multi tenant SaaS solution using "SaaS-Tenant " Framework
P a g e 2 Convert your web application to a Multi tenant SaaS solution using "SaaS-Tenant " Framework An account of directions and steps to speedily convert your web application into a cloud application
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
SaaS A Product Perspective
SaaS A Product Perspective Software-as-a-Service (SaaS) is quickly gaining credibility and market share against traditional packaged software. This presents new opportunities for product groups and also
Exploring Resource Provisioning Cost Models in Cloud Computing
Exploring Resource Provisioning Cost Models in Cloud Computing P.Aradhya #1, K.Shivaranjani *2 #1 M.Tech, CSE, SR Engineering College, Warangal, Andhra Pradesh, India # Assistant Professor, Department
Security Considerations for Public Mobile Cloud Computing
Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea [email protected] 2 Research Institute of
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS
INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing
Software as a Service (SaaS) Testing Challenges- An Indepth
www.ijcsi.org 506 Software as a Service (SaaS) Testing Challenges- An Indepth Analysis Prakash.V Ravikumar Ramadoss Gopalakrishnan.S Assistant Professor Department of Computer Applications, SASTRA University,
Monitoring Performances of Quality of Service in Cloud with System of Systems
Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
Architecting the Cloud
Architecting the Cloud Sumanth Tarigopula Director, India Center, Best Shore Applications Services 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
Azure Scalability Prescriptive Architecture using the Enzo Multitenant Framework
Azure Scalability Prescriptive Architecture using the Enzo Multitenant Framework Many corporations and Independent Software Vendors considering cloud computing adoption face a similar challenge: how should
The Need for Service Catalog Design in Cloud Services Development
The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental
Relay2 Enterprise Cloud Controller Datasheet
Relay2 Enterprise Cloud WLAN Network Controller Provides the power of enterprise network services without the complexities and cost of traditional hardware- based Wi- Fi controllers The Relay2 Enterprise
PRODUCT SHEET: CA Arcot Cloud Services Data Centers CA Arcot cloud services data centers. True multi-tenancy and scalability
PRODUCT SHEET: CA Arcot Cloud Services Data Centers CA Arcot cloud services data centers Delivering consistent quality of service, scalability and service level assurance When it comes to cloud-based online
IBM Cognos 8 BI: The platform of choice for Software as a Service (SaaS)
Data Sheet IBM Cognos 8 BI: The platform of choice for Software as a Service (SaaS) Both large-scale enterprises and midsize organizations are turning to software as a service (SaaS) providers to decrease
Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics
577 Hitachi Review Vol. 63 (2014),. 9 Featured Articles Privacy-preserving Analysis Technique for Secure, Cloud-based Big Data Analytics Ken Naganuma Masayuki Yoshino, Ph.D. Hisayoshi Sato, Ph.D. Yoshinori
This paper defines as "Classical"
Principles of Transactional Approach in the Classical Web-based Systems and the Cloud Computing Systems - Comparative Analysis Vanya Lazarova * Summary: This article presents a comparative analysis of
Cloud Computing Security Issues And Methods to Overcome
Cloud Computing Security Issues And Methods to Overcome Manas M N 1, Nagalakshmi C K 2, Shobha G 3 MTech, Computer Science & Engineering, RVCE, Bangalore, India 1,2 Professor & HOD, Computer Science &
White Paper. Cloud Performance Testing
White Paper Cloud Performance Testing Table of Contents Introduction and Background Information...2 Challenges & Limitations of On-Premise Model. 2 Cloud Scope and Service Models... 3 Why Cloud for Performance
Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.
WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read
Fundamentals of Web Programming a
Fundamentals of Web Programming a Software As A Service Teodor Rus [email protected] The University of Iowa, Department of Computer Science a Copyright 2009 Teodor Rus. These slides have been developed
A Novel Cloud Computing Data Fragmentation Service Design for Distributed Systems
A Novel Cloud Computing Data Fragmentation Service Design for Distributed Systems Ismail Hababeh School of Computer Engineering and Information Technology, German-Jordanian University Amman, Jordan Abstract-
White Paper: Assessing Performance & Response Time Requirements
White Paper: Assessing Performance & Response Time Requirements Mark Houghtlin IBM Cloud Advisory Services & Application Performance Optimization Consulting Practice Agenda Workload Transformation Analysis
SaaS & Cloud Application Development & Delivery
SaaS & Cloud Application Development & Delivery A Whitepaper by Ekartha, Inc. by Gurpreet Singh, Ekartha Inc. Raj Sethi, Ekartha Inc. Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516)
The Software-as-a Service (SaaS) Delivery Stack
The Software-as-a Service (SaaS) Delivery Stack A Framework for Delivering Successful SaaS Applications October 2010 2010 Online Tech, Inc. Page 1 of 12 www.onlinetech.com Audience Executives, founders,
Parallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure
Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Chandrakala Department of Computer Science and Engineering Srinivas School of Engineering, Mukka Mangalore,
Achieve Economic Synergies by Managing Your Human Capital In The Cloud
Achieve Economic Synergies by Managing Your Human Capital In The Cloud By Orblogic, March 12, 2014 KEY POINTS TO CONSIDER C LOUD S OLUTIONS A RE P RACTICAL AND E ASY TO I MPLEMENT Time to market and rapid
City of Houston HITS Cloud Strategy and Body Worn Camera Project. Tina Carkhuff CIO/Interim Director
City of Houston HITS Cloud Strategy and Body Worn Camera Project 1 Tina Carkhuff CIO/Interim Director Agenda 2 Overall HITS Goals Definitions On-Premise Storage Cloud-based Storage Advantages and Disadvantages
A Variability Viewpoint for Enterprise Software Systems
2012 Joint Working Conference on Software Architecture & 6th European Conference on Software Architecture A Variability Viewpoint for Enterprise Software Systems Matthias Galster University of Groningen,
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Software-as-a-Service: Changing How You Share Information in Today s Changing Business World. Part II
Software-as-a-Service: Changing How You Share Information in Today s Changing Business World Part II Contents Introduction...1 Guidelines for Choosing an Online Workspace Provider...2 Evaluating SaaS Solutions:
Strategic Management System for Academic World
2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore Strategic Management System for Academic World Expert System Based on Composition
IP Address Management: Smoothing the Way to Cloud-Based Services
White Paper IP Address Management: Smoothing the Way to Cloud-Based Services What You Will Learn Cloud computing offers many operational advantages to service providers. An important element of successful
Cloud Computing Architecture: A Survey
Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and
Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical
Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation
OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing
OCRP Implementation to Optimize Resource Provisioning Cost in Cloud Computing K. Satheeshkumar PG Scholar K. Senthilkumar PG Scholar A. Selvakumar Assistant Professor Abstract- Cloud computing is a large-scale
Private Vs Public Cloud
Private Vs Public Cloud Solanke Vikas 1, Kulkarni Gurudatt 2, Maske Vishnu 3, Kumbharkar Prashant 4 1 Lecturer in Information Technology Department,MM Polytechnic Pune, India [email protected]
Ch. 4 - Topics of Discussion
CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture 6 Cloud Platform Architecture over Virtualized Data Centers Part -2: Data-Center Design and Interconnection Networks & Architecture
A Quality Model for E-Learning as a Service in Cloud Computing Framework
A Quality Model for E-Learning as a Service in Cloud Computing Framework Dr Rajni Jindal Professor, Department of IT Indira Gandhi Institute of Technology, New Delhi, INDIA [email protected] Alka Singhal
INCREASING SERVER UTILIZATION AND ACHIEVING GREEN COMPUTING IN CLOUD
INCREASING SERVER UTILIZATION AND ACHIEVING GREEN COMPUTING IN CLOUD M.Rajeswari 1, M.Savuri Raja 2, M.Suganthy 3 1 Master of Technology, Department of Computer Science & Engineering, Dr. S.J.S Paul Memorial
Successfully Deploying Globalized Applications Requires Application Delivery Controllers
SHARE THIS WHITEPAPER Successfully Deploying Globalized Applications Requires Application Delivery Controllers Whitepaper Table of Contents Abstract... 3 Virtualization imposes new challenges on mission
Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data
Minder simplifying IT All-in-one solution to monitor Network, Server, Application & Log Data Simplify the Complexity of Managing Your IT Environment... To help you ensure the availability and performance
PRACTICAL USE CASES BPA-AS-A-SERVICE: The value of BPA
BPA-AS-A-SERVICE: PRACTICAL USE CASES How social collaboration and cloud computing are changing process improvement TABLE OF CONTENTS 1 Introduction 1 The value of BPA 2 Social collaboration 3 Moving to
Introduction to Cloud Computing
Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services
PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION
PLATFORM-AS-A-SERVICE: ADOPTION, STRATEGY, PLANNING AND IMPLEMENTATION White Paper May 2012 Abstract Whether enterprises choose to use private, public or hybrid clouds, the availability of a broad range
Making Sense of Email Archiving for Microsoft Email Environments
Making Sense of Email Archiving for Microsoft Email Environments Contents Why Email Archiving Matters.................................... 1 Archiving Challenges: PST Files and Other Enemies of Exchange
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Database Migration over Network
Database Migration over Network Kanimozhi N 1, Thresphine J. R 2 1 M.TECH (Computer Science & Eng), PRIST University, Pondicherry India 2 Assistant Professor (Computer Science & Eng), PRIST University,
AMANDA Managed Services Understanding the benefits of moving to the cloud
Understanding the benefits of moving to the cloud WHITEPAPER Content Summary 1 Introduction 2 Challenges of Enterprise Implementations 3 Hosting and 4 The Technology Stack 5 and Hosting Alternatives Understanding
